Andrew Kellett, Principal Analyst, Infrastructure and SecurityMaintaining security that meets the risk and compliance requirements of the enterprise is a constant challenge. Systems and networks are becoming more open and accessible, but at the same time, threats have become more advanced, persistent, and complex. This is a particularly important issue in highly regulated markets such as financial services, where failure to protect sensitive information will have a negative effect on the business and how it is...

Looking beyond HIPAA, SOX or PCI-DSS compliance claims

The scary part about shopping for a cloud solution is that even if the managed services provider claims compliance, this doesn’t mean that they actually are compliant. In fact, the provider may not even realise they are being misleading. Because regulatory compliance is too often left open to interpretation, your definition of HIPAA, SOX or PCI-DSS compliance might be different...

Roy Illsley, Principal Analyst, Ovum SoftwareIBM recently made three significant announcements about its vision for how cloud computing will be adopted by enterprise customers. First, IBM believes that open standards are needed to drive increased customer demand for workload portability in a hybrid cloud environment. Second, IBM has segmented the adoption of cloud computing as two different strategies serving two different reasons to adopt cloud computing, namely a cloud-enabled approach and a cloud-centric approach. A...

Alert Logic’s latest cloud security report has summarised that cloud security providers (CSPs) are “inherently no less secure than enterprise data centres”, and that cloud security threats continue to follow a consistent pattern.

In its State of Cloud Security Report, subtitled “Targeted Attacks and Opportunistic Hacks”, the network security provider observed over 45,000 security incidents and found that some things don’t change; Web application attacks are the biggest...

It is inarguable that change is sweeping the IT industry. Over the last five years a number of new technologies that provide huge technological advantages (and create management headaches) have been developed. We have attempted to leverage these advances to the benefit of our organizations, while at the same time struggling with how to incorporate them into our established IT management methodologies. Do we need to throw out our mature management protocols in...

Kirill Tatarinov’s keynote this morning at Microsoft’s Convergence 2013 marks a subtle, yet very significant shift in how this technology leader is marketing itself to partners and the outside world. They are humanizing their marketing, messaging and products.

If you’ve been around the block a few times, you’re probably wondering why the title of this post isn’t, 50 Reasons VPNs Suck in the Cloud. VPNs have long been the bane of both administrators and users (and lets not forget, support). They’re clunky, complex, and costly, and the same is true when they’re deployed to secure cloud access. Today, VPNs are increasingly used to connect to cloud computing resources. Either by...

Categories

Cloud Tech promotes industry thought leadership content from industry brands, businesses and analysts, partnering with writers and bloggers to deliver insight and advice on cloud IT strategy to our extensive audience of CIOs and IT managers.